Pascal and Francis Bibliographic Databases

Help

Search results

Your search

is.\*:("1389-1286")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1529

  • Page / 62
Export

Selection :

  • and

A branching process approach to compute the delay and energy efficiency of tree algorithms with free accessBLOCK, R; PEETERS, G. T; VAN HOUDT, B et al.Computer networks (1999). 2014, Vol 58, pp 13-28, issn 1389-1286, 16 p.Article

Adaptive congestion control framework and a simple implementation on high bandwidth-delay product networksMIN WANG; JUNFENG WANG; SUNYOUNG HAN et al.Computer networks (1999). 2014, Vol 64, pp 308-321, issn 1389-1286, 14 p.Article

Delay-based congestion control: Flow vs. BitTorrent swarm perspectivesTESTA, Claudio; ROSSI, Dario.Computer networks (1999). 2014, Vol 60, pp 115-128, issn 1389-1286, 14 p.Article

Detect smart intruders in sensor networks by creating network dynamicsJIE TIAN; GUILING WANG; TAN YAN et al.Computer networks (1999). 2014, Vol 62, pp 182-196, issn 1389-1286, 15 p.Article

Efficient Two Dimensional-IP routing: An incremental deployment designMINGWEI XU; SHU YANG; DAN WANG et al.Computer networks (1999). 2014, Vol 59, pp 227-243, issn 1389-1286, 17 p.Article

Energy efficient network protocol architecture for narrowband power line communication networksDVORAK, Jan; NOVAK, Jiří; KOCOUREK, Petr et al.Computer networks (1999). 2014, Vol 69, pp 35-50, issn 1389-1286, 16 p.Article

Energy efficient routing algorithm for fiber-wireless access networks: A network formation game approachCOIMBRA, J; SCHÜTZ, G; CORREIA, N et al.Computer networks (1999). 2014, Vol 60, pp 201-216, issn 1389-1286, 16 p.Article

Energy-aware joint management of networks and Cloud infrastructuresADDIS, Bernardetta; ARDAGNA, Danilo; CAPONE, Antonio et al.Computer networks (1999). 2014, Vol 70, pp 75-95, issn 1389-1286, 21 p.Article

Enhancing wireless networks with caching: Asymptotic laws, sustainability & trade-offsGITZENIS, S; PASCHOS, G. S; TASSIULAS, L et al.Computer networks (1999). 2014, Vol 64, pp 353-368, issn 1389-1286, 16 p.Article

LBAS: An effective pricing mechanism towards video migration in cloud-assisted VoD systemXIN CONG; KAI SHUANG; SEN SU et al.Computer networks (1999). 2014, Vol 64, pp 15-25, issn 1389-1286, 11 p.Article

MI3M: A framework for media independent multicast mobility managementFIGUEIREDO, Sérgio; GUIMARAES, Carlos; CORUJO, Daniel et al.Computer networks (1999). 2014, Vol 70, pp 345-365, issn 1389-1286, 21 p.Article

Novel methods for virtual network compositionHAMMAD, Ali; NEJABATI, Reza; SIMEONIDOU, Dimitra et al.Computer networks (1999). 2014, Vol 67, pp 14-25, issn 1389-1286, 12 p.Article

On the interdependency between multi-channel scheduling and tree-based routing for WSNs in smart grid environmentsYIGIT, Melike; INCEL, Ozlem Durmaz; GUNGOR, Vehbi Cagri et al.Computer networks (1999). 2014, Vol 65, pp 1-20, issn 1389-1286, 20 p.Article

On the performance of secure user-centric VoIP communicationFRANGOUDIS, Pantelis A; POLYZOS, George C.Computer networks (1999). 2014, Vol 70, pp 330-344, issn 1389-1286, 15 p.Article

Optimal and achievable cost/delay tradeoffs in delay-tolerant networksTASIOPOULOS, Argyrios G; TSIARAS, Christos; TOUMPIS, Stavros et al.Computer networks (1999). 2014, Vol 70, pp 59-74, issn 1389-1286, 16 p.Article

Optimized hash for network path encoding with minimized false positivesCARREA, Laura; VERNITSKI, Alexei; REED, Martin et al.Computer networks (1999). 2014, Vol 58, pp 180-191, issn 1389-1286, 12 p.Article

Peer-to-peer publication, search and retrieval using the Android mobile platformLOMBERA, Isaí Michel; MOSER, Louise E; MELLIAR-SMITH, P. Michael et al.Computer networks (1999). 2014, Vol 65, pp 56-72, issn 1389-1286, 17 p.Article

Popularity decays in peer-to-peer VoD systems: Impact, model, and design implicationsFEI CHEN; HAITAO LI; JIANGCHUAN LIU et al.Computer networks (1999). 2014, Vol 60, pp 75-87, issn 1389-1286, 13 p.Article

Power line communication technologies for smart grid applications: A review of advances and challengesYIGIT, Melike; GUNGOR, V. Cagri; TUNA, Gurkan et al.Computer networks (1999). 2014, Vol 70, pp 366-383, issn 1389-1286, 18 p.Article

Provably secure three-party authenticated key agreement protocol using smart cardsHAOMIN YANG; YAOXUE ZHANG; YUEZHI ZHOU et al.Computer networks (1999). 2014, Vol 58, pp 29-38, issn 1389-1286, 10 p.Article

Sink discovery in location-free and mobile-sink wireless sensor networksCHU, Wei-Cheng; SSU, Kuo-Feng.Computer networks (1999). 2014, Vol 67, pp 123-140, issn 1389-1286, 18 p.Article

The design and implementation of the A3 application-aware anonymity platformSHERR, Micah; GILL, Harjot; TAHER AQUIL SAEED et al.Computer networks (1999). 2014, Vol 58, pp 206-227, issn 1389-1286, 22 p.Article

TorrentGuard: Stopping scam and malware distribution in the BitTorrent ecosystemCUEVAS, Rubén; KRYCZKA, Michal; GONZALEZ, Roberto et al.Computer networks (1999). 2014, Vol 59, pp 77-90, issn 1389-1286, 14 p.Article

User behaviors in private BitTorrent communitiesJIA, Adele L; XIAOWEI CHEN; XIAOWEN CHU et al.Computer networks (1999). 2014, Vol 60, pp 34-45, issn 1389-1286, 12 p.Article

VirtualKnotter: Online virtual machine shuffling for congestion resolving in virtualized datacenterSHIHONG ZOU; XITAO WEN; KAI CHEN et al.Computer networks (1999). 2014, Vol 67, pp 141-153, issn 1389-1286, 13 p.Article

  • Page / 62